Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters

We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and call...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2018
Hauptverfasser: Bunin, Alexander, Goldfeld, Ziv, Permuter, Haim H., Shamai, Shlomo, Cuff, Paul, Piantanida, Pablo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title IEEE transactions on information forensics and security
container_volume
creator Bunin, Alexander
Goldfeld, Ziv
Permuter, Haim H.
Shamai, Shlomo
Cuff, Paul
Piantanida, Pablo
description We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.
format Article
fullrecord <record><control><sourceid>hal</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01742444v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>oai_HAL_hal_01742444v1</sourcerecordid><originalsourceid>FETCH-hal_primary_oai_HAL_hal_01742444v13</originalsourceid><addsrcrecordid>eNqVyk8LgjAYgPEdCrI_32HXDoMtp3UNKYQKIgWP8qKvuZhTtlX47SPoC3R64MczIYGIopjFXIQzMnfuwbmUIt4FpMiwA-NVBVqPLMPqabGmF3QO7shOONLcQo2sbxrav9DSQln0MNCkBWNQO_pWvqU3MHXf0StY6NCjdUsybUA7XP26IOvjIU9S1oIuB6s6sGPZgyrT_bn8GhdbuZFSvkT4z_sB8ShEqg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</title><source>IEEE Electronic Library (IEL)</source><creator>Bunin, Alexander ; Goldfeld, Ziv ; Permuter, Haim H. ; Shamai, Shlomo ; Cuff, Paul ; Piantanida, Pablo</creator><creatorcontrib>Bunin, Alexander ; Goldfeld, Ziv ; Permuter, Haim H. ; Shamai, Shlomo ; Cuff, Paul ; Piantanida, Pablo</creatorcontrib><description>We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.</description><identifier>ISSN: 1556-6013</identifier><language>eng</language><publisher>Institute of Electrical and Electronics Engineers</publisher><subject>Computer Science ; Information Theory ; Mathematics ; Networking and Internet Architecture ; Statistics</subject><ispartof>IEEE transactions on information forensics and security, 2018</ispartof><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0002-6594-3371 ; 0000-0002-8717-2117 ; 0000-0002-8717-2117 ; 0000-0002-6594-3371</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885,4022</link.rule.ids><backlink>$$Uhttps://centralesupelec.hal.science/hal-01742444$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Bunin, Alexander</creatorcontrib><creatorcontrib>Goldfeld, Ziv</creatorcontrib><creatorcontrib>Permuter, Haim H.</creatorcontrib><creatorcontrib>Shamai, Shlomo</creatorcontrib><creatorcontrib>Cuff, Paul</creatorcontrib><creatorcontrib>Piantanida, Pablo</creatorcontrib><title>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</title><title>IEEE transactions on information forensics and security</title><description>We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.</description><subject>Computer Science</subject><subject>Information Theory</subject><subject>Mathematics</subject><subject>Networking and Internet Architecture</subject><subject>Statistics</subject><issn>1556-6013</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNqVyk8LgjAYgPEdCrI_32HXDoMtp3UNKYQKIgWP8qKvuZhTtlX47SPoC3R64MczIYGIopjFXIQzMnfuwbmUIt4FpMiwA-NVBVqPLMPqabGmF3QO7shOONLcQo2sbxrav9DSQln0MNCkBWNQO_pWvqU3MHXf0StY6NCjdUsybUA7XP26IOvjIU9S1oIuB6s6sGPZgyrT_bn8GhdbuZFSvkT4z_sB8ShEqg</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Bunin, Alexander</creator><creator>Goldfeld, Ziv</creator><creator>Permuter, Haim H.</creator><creator>Shamai, Shlomo</creator><creator>Cuff, Paul</creator><creator>Piantanida, Pablo</creator><general>Institute of Electrical and Electronics Engineers</general><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid></search><sort><creationdate>2018</creationdate><title>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</title><author>Bunin, Alexander ; Goldfeld, Ziv ; Permuter, Haim H. ; Shamai, Shlomo ; Cuff, Paul ; Piantanida, Pablo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-hal_primary_oai_HAL_hal_01742444v13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science</topic><topic>Information Theory</topic><topic>Mathematics</topic><topic>Networking and Internet Architecture</topic><topic>Statistics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bunin, Alexander</creatorcontrib><creatorcontrib>Goldfeld, Ziv</creatorcontrib><creatorcontrib>Permuter, Haim H.</creatorcontrib><creatorcontrib>Shamai, Shlomo</creatorcontrib><creatorcontrib>Cuff, Paul</creatorcontrib><creatorcontrib>Piantanida, Pablo</creatorcontrib><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bunin, Alexander</au><au>Goldfeld, Ziv</au><au>Permuter, Haim H.</au><au>Shamai, Shlomo</au><au>Cuff, Paul</au><au>Piantanida, Pablo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><date>2018</date><risdate>2018</risdate><issn>1556-6013</issn><abstract>We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inner bound on the semantic-security (SS) SM-SK capacity region is derived based on a superposition coding scheme inspired by a past work of the authors. The region is shown to attain capacity for a certain class of SD-WTCs. SS is established by virtue of two versions of the strong soft-covering lemma. The derived region yields an improvement upon the previously best known SM-SK trade-off result reported by Prabhakaran et al., and, to the best of our knowledge, upon all other existing lower bounds for either SM or SK for this setup, even if the semantic security requirement is relaxed to weak secrecy. It is demonstrated that our region can be strictly larger than those reported in the preceding works.</abstract><pub>Institute of Electrical and Electronics Engineers</pub><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-8717-2117</orcidid><orcidid>https://orcid.org/0000-0002-6594-3371</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2018
issn 1556-6013
language eng
recordid cdi_hal_primary_oai_HAL_hal_01742444v1
source IEEE Electronic Library (IEL)
subjects Computer Science
Information Theory
Mathematics
Networking and Internet Architecture
Statistics
title Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T11%3A00%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Semantically-Secured%20Message-Key%20Trade-off%20over%20Wiretap%20Channels%20with%20Random%20Parameters&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Bunin,%20Alexander&rft.date=2018&rft.issn=1556-6013&rft_id=info:doi/&rft_dat=%3Chal%3Eoai_HAL_hal_01742444v1%3C/hal%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true